antiviruscyberattackCyberDefenseincidentinsiderthreatspywareWISPvirusencryptionOSProofpointresilienceconfidentialityIOCsecurityawarenesszero-daymalwareFTPintegrityrootkitfirewallVPNSyssecAdminvulnerabilityPIISecurityOperationsIoTEDRbotnetcryptographytrainingincidentresponseDarkWebDefense-in-depthsocialengineeringadminMFAwormavailabilityspoofingsecuritypolicypentestvishingcompliancenetworkriskassessmentbusinesscontinuityescalationDDoSdefenseevasionidentitytheftbreachriskBECpasswordCIAtriadIDSbugphishingpassphrasesmishingspamexploitHIPAACyberSecurityransomwarehackerIPAPTPHIpacketIPSantiviruscyberattackCyberDefenseincidentinsiderthreatspywareWISPvirusencryptionOSProofpointresilienceconfidentialityIOCsecurityawarenesszero-daymalwareFTPintegrityrootkitfirewallVPNSyssecAdminvulnerabilityPIISecurityOperationsIoTEDRbotnetcryptographytrainingincidentresponseDarkWebDefense-in-depthsocialengineeringadminMFAwormavailabilityspoofingsecuritypolicypentestvishingcompliancenetworkriskassessmentbusinesscontinuityescalationDDoSdefenseevasionidentitytheftbreachriskBECpasswordCIAtriadIDSbugphishingpassphrasesmishingspamexploitHIPAACyberSecurityransomwarehackerIPAPTPHIpacketIPS

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. antivirus
  2. cyber attack
  3. Cyber Defense
  4. incident
  5. insider threat
  6. spyware
  7. WISP
  8. virus
  9. encryption
  10. OS
  11. Proofpoint
  12. resilience
  13. confidentiality
  14. IOC
  15. security awareness
  16. zero-day
  17. malware
  18. FTP
  19. integrity
  20. rootkit
  21. firewall
  22. VPN
  23. SyssecAdmin
  24. vulnerability
  25. PII
  26. Security Operations
  27. IoT
  28. EDR
  29. botnet
  30. cryptography
  31. training
  32. incident response
  33. Dark Web
  34. Defense-in-depth
  35. social engineering
  36. admin
  37. MFA
  38. worm
  39. availability
  40. spoofing
  41. security policy
  42. pentest
  43. vishing
  44. compliance
  45. network
  46. risk assessment
  47. business continuity
  48. escalation
  49. DDoS
  50. defense evasion
  51. identity theft
  52. breach
  53. risk
  54. BEC
  55. password
  56. CIA triad
  57. IDS
  58. bug
  59. phishing
  60. passphrase
  61. smishing
  62. spam
  63. exploit
  64. HIPAA
  65. Cyber Security
  66. ransomware
  67. hacker
  68. IP
  69. APT
  70. PHI
  71. packet
  72. IPS